Presentation is loading. Please wait.

Presentation is loading. Please wait.

11 CONFIGURING TCP/IP ADDRESSING AND SECURITY Chapter 11.

Similar presentations


Presentation on theme: "11 CONFIGURING TCP/IP ADDRESSING AND SECURITY Chapter 11."— Presentation transcript:

1 11 CONFIGURING TCP/IP ADDRESSING AND SECURITY Chapter 11

2 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY2 OVERVIEW  Understand IP addressing  Manage IP subnetting and subnet masks  Understand IP security terminology  Manage Internet security features of Windows XP  Configure and troubleshoot Windows Firewall  Understand IP addressing  Manage IP subnetting and subnet masks  Understand IP security terminology  Manage Internet security features of Windows XP  Configure and troubleshoot Windows Firewall

3 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY3 UNDERSTANDING BINARY NUMBERS

4 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY4 CONVERTING DECIMAL ADDRESSES TO BINARY

5 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY5 CONVERTING BINARY ADDRESSES TO DECIMAL

6 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY6 USING CALCULATOR TO CONVERT NUMBERS

7 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY7 SUBNET MASKS

8 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY8 PROBLEMS WITH CLASSFUL ADDRESSES  Wasted addresses  Shortage of address blocks  Excessive routing table entries  Wasted addresses  Shortage of address blocks  Excessive routing table entries

9 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY9 SUBNETTING A LARGE NETWORK

10 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY10 CLASSLESS INTERDOMAIN ROUTING (CIDR)

11 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY11 SUPERNETS

12 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY12 SECURING IP COMMUNICATIONS  Internet threats  Protective technologies  Configuring and managing Windows Firewall  Monitoring Internet communications security  Internet threats  Protective technologies  Configuring and managing Windows Firewall  Monitoring Internet communications security

13 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY13 INTERNET THREATS  Viruses (the oldest threat)  Worms (the most persistent threat)  Trojan horses  Spyware  Zombies  Direct hacking  Viruses (the oldest threat)  Worms (the most persistent threat)  Trojan horses  Spyware  Zombies  Direct hacking

14 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY14 VIRUSES  Take advantage of gullible users  Infect document, graphics, and executable files  Often include mass-mailing components  Can carry destructive payloads  Take advantage of gullible users  Infect document, graphics, and executable files  Often include mass-mailing components  Can carry destructive payloads

15 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY15 WORMS  Self-replicating  Network-aware  Use bugs in programs or systems to spread  Can carry viruses or other payloads  Self-replicating  Network-aware  Use bugs in programs or systems to spread  Can carry viruses or other payloads

16 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY16 TROJAN HORSES  Usually e-mailed or downloaded  Appear to be a useful program or game  Carry payload or back door application  Usually e-mailed or downloaded  Appear to be a useful program or game  Carry payload or back door application

17 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY17 SPYWARE  Has attributes of Trojan horses or worms  Spies on its victim  Might transmit marketing data or transmit personal data to the spyware author  Has attributes of Trojan horses or worms  Spies on its victim  Might transmit marketing data or transmit personal data to the spyware author

18 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY18 ZOMBIES  Payload of worm or Trojan horse  Remotely controlled to attack network targets  Participate in large-scale assaults on public Web sites  Payload of worm or Trojan horse  Remotely controlled to attack network targets  Participate in large-scale assaults on public Web sites

19 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY19 DIRECT HACKING  Relatively low incidence  Hardest form of attack to defeat  Relatively low incidence  Hardest form of attack to defeat

20 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY20 PROTECTIVE TECHNOLOGIES  Security Center  Windows Firewall  Internet Connection Sharing (ICS)  Third-party utilities  Security Center  Windows Firewall  Internet Connection Sharing (ICS)  Third-party utilities

21 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY21 SECURITY CENTER

22 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY22 FIREWALL TERMINOLOGY  Packet filtering  Stateful packet filtering  Exceptions (packet filter rules)  Allowed traffic  Rejected traffic  Logging  Packet filtering  Stateful packet filtering  Exceptions (packet filter rules)  Allowed traffic  Rejected traffic  Logging

23 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY23 ENABLING WINDOWS FIREWALL

24 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY24 FIREWALL EXCEPTIONS

25 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY25 ADVANCED WINDOWS FIREWALL SETTINGS

26 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY26 MONITORING INTERNET SECURITY  Windows Firewall monitoring  Service logs  Event logs  Windows Firewall monitoring  Service logs  Event logs

27 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY27 WINDOWS FIREWALL ALERTS

28 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY28 WINDOWS FIREWALL LOGS

29 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY29 SERVER LOGS

30 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY30 SUMMARY  IP addresses are 32-bit binary addresses.  The network portion of IP addresses determines location.  CIDR allows creation of custom netblocks.  CIDR permits use of variable-length subnet masks.  Windows Firewall blocks unauthorized packets.  Windows Firewall exceptions allow specified traffic to pass through the firewall.  Alerts and logs warn of attempted attacks.  IP addresses are 32-bit binary addresses.  The network portion of IP addresses determines location.  CIDR allows creation of custom netblocks.  CIDR permits use of variable-length subnet masks.  Windows Firewall blocks unauthorized packets.  Windows Firewall exceptions allow specified traffic to pass through the firewall.  Alerts and logs warn of attempted attacks.


Download ppt "11 CONFIGURING TCP/IP ADDRESSING AND SECURITY Chapter 11."

Similar presentations


Ads by Google